Internet research ethics: The field and its critical issues

EA Buchanan, C Ess - The handbook of information and …, 2008 - Wiley Online Library
Internet research ethics (IRE) is an emerging multi-and interdisciplinary field that
systematically studies the ethical implications that arise from the use of the Internet as a …

The menlo report

M Bailey, D Dittrich, E Kenneally… - IEEE Security & …, 2012 - ieeexplore.ieee.org
On 28 December 2011, the US Department of Homeland Security, Science and Technology,
Cyber Security Division released" The Menlo Report: Ethical Principles Guiding Information …

“How technical do you get? I'm an English teacher”: Teaching and Learning Cybersecurity and AI Ethics in High School

Z Kilhoffer, Z Zhou, F Wang, F Tamton… - … IEEE symposium on …, 2023 - ieeexplore.ieee.org
Today's cybersecurity and AI technologies are often fraught with ethical challenges. One
promising direction is to teach cybersecurity and AI ethics to today's youth. However, we …

Ethics governance development: The case of the Menlo Report

M Finn, K Shilton - Social Studies of Science, 2023 - journals.sagepub.com
The 2012 Menlo Report was an effort in which a group of computer scientists, US
government funders, and lawyers produced ethics guidelines for research in information and …

[PDF][PDF] Ethical frameworks for cybersecurity

M Loi, M Christen - The Ethics of Cybersecurity, 2020 - library.oapen.org
This chapter presents several ethical frameworks that are useful for analysing ethical
questions of cybersecurity. It begins with two frameworks that are important in practice: the …

Ethical hardware reverse engineering for securing the digital supply chain in critical infrastructure

AR Nygård, SK Katsikas - Information & Computer Security, 2024 - emerald.com
Purpose This paper aims to discuss the ethical aspects of hardware reverse engineering
(HRE) and propose an ethical framework for HRE when used to mitigate cyber risks of the …

Computer science security research and human subjects: Emerging considerations for research ethics boards

E Buchanan, J Aycock, S Dexter… - Journal of Empirical …, 2011 - journals.sagepub.com
This paper explores the growing concerns with computer science research, and in particular,
computer security research and its relationship with the committees that review human …

Human-In-The-Loop Automatic Program Repair

C Geethal, M Böhme, VT Pham - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
learn2fix is a human-in-the-loop interactive program repair technique, which can be applied
when no bug oracle—except the user who is reporting the bug—is available. This approach …

DDOS attack detection and mitigation technique based on Http count and verification using CAPTCHA

KJ Singh, T De - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
With the rapid development of internet, the number of people who are online also increases
tremendously. But now a day's we find not only growing positive use of internet but also the …

[PDF][PDF] Forgive Us our SYNs: Technical and Ethical Considerations for Measuring Internet Filtering.

JR Crandall, M Crete-Nishihata… - NS Ethics …, 2015 - jeffreyknockel.com
We provide an overview of technical and ethical considerations for measuring Internet
filtering, focusing on clientside and network side channel techniques. Client-side …